{"id":3556,"date":"2021-11-19T19:43:06","date_gmt":"2021-11-19T18:43:06","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-97\/"},"modified":"2022-12-04T13:40:02","modified_gmt":"2022-12-04T12:40:02","slug":"botenago-prijetnja-za-rutere-i-iot-uredjaje","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2021\/11\/19\/botenago-prijetnja-za-rutere-i-iot-uredjaje\/","title":{"rendered":"BotenaGo: prijetnja za rutere i IoT ure\u0111aje"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Sigurnosni <a href=\"https:\/\/cybersecurity.att.com\/blogs\/labs-research\/att-alien-labs-finds-new-golang-malwarebotenago-targeting-millions-of-routers-and-iot-devices-with-more-than-30-exploits\" target=\"_blank\" rel=\"noopener\">istra\u017eiva\u010di iz kompanije <em>AT&amp;T Labs<\/em> su otkrili<\/a> novi <a href=\"https:\/\/sajberinfo.com\/en\/2021\/09\/26\/malware\/\" target=\"_blank\" rel=\"noopener\">zlonamjerni softver<\/a> nazvan <em>BotenaGo<\/em> koji ima mogu\u0107nost da iskoristi ranjivosti u mre\u017enim ruterima i <em>IoT<\/em> ure\u0111ajima kori\u0161tenjem preko 30 razli\u010ditih metoda. Za sada nepoznati napada\u010di koriste programski jezik <em>Go<\/em> (poznat jo\u0161 kao <em>Golang<\/em>) otvorenog koda razvijen od strane kompanije <em>Google<\/em>. Ovaj programski jezik je vjerovatno izabran zato \u0161to jednom napisan k\u00f4d se mo\u017ee vrlo lako primjenjivati na razli\u010ditim operativnim sistema.<\/span><\/span><\/p>\n<div id=\"attachment_3675\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3675\" class=\"size-full wp-image-3675\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/BotenaGo-1024x768-1.jpg\" alt=\"BotenaGo zlonamjerni softver\" width=\"1024\" height=\"513\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/BotenaGo-1024x768-1.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/BotenaGo-1024x768-1-300x150.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/BotenaGo-1024x768-1-768x385.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/BotenaGo-1024x768-1-18x9.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3675\" class=\"wp-caption-text\"><em>BotenaGo<\/em> zlonamjerni softver<\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Napad zapo\u010dinje skeniranjem ranjivosti dostupnih ure\u0111aja na Internetu i mapiranjem potencijalnih \u017ertvi. Nakon toga napada\u010di mogu da iskoriste neza\u0161ti\u0107ene ure\u0111aje izvr\u0161avanjem daljinskih komandi ili ubacivanjem zlonamjernog sadr\u017eaja. <em>BotenaGo<\/em> ima potencijal infekcije oko milion neza\u0161ti\u0107enih ure\u0111aja, uz jo\u0161 uvijek nejasnu svrhu. Naga\u0111a se da bi ovaj zlonamjerni softver moga biti dio kompleksnijeg zlonamjernog softvera koji se trenutno ne koristi ili dio <em>Mirai botnet<\/em> mre\u017ee sa namjenom da cilja ta\u010dno odre\u0111ene ure\u0111aje. Posljednja opcija bi mogla biti, da je ovaj zlonamjerni softver jo\u0161 u razvojnoj fazi razvoja i da je slu\u010dajno pokrenut ranije \u2013 razlog je taj\u00a0 \u0161to jo\u0161 ne pravi neku ve\u0107u \u0161tetu. Neke od ranjivosti koje <em>BotenaGo<\/em> iskori\u0161tava su:<\/span><\/span><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: left;\">\n<div id=\"attachment_3676\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3676\" class=\"size-full wp-image-3676\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/ranjivosti-1024x768-1.jpg\" alt=\"vulnerabilities (CVE)\" width=\"1024\" height=\"264\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/ranjivosti-1024x768-1.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/ranjivosti-1024x768-1-300x77.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/ranjivosti-1024x768-1-768x198.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/ranjivosti-1024x768-1-18x5.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3676\" class=\"wp-caption-text\">Ranjivosti (<em>CVE<\/em>)<\/p><\/div>\n<\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: large;\"><span style=\"font-family: inherit;\"><span style=\"font-size: 14pt;\">Iako izgleda neaktivno, <em>BotenaGo<\/em> bi mogao da iskoristi oko milion potencijalno ranjivih ure\u0111aja, \u0161to samo po sebi predstavlja problem. Kako bi se za\u0161titili, potrebno je da korisnici primjene sva dostupna a\u017euriranja na svojim ure\u0111ajima da se smanji potencijalni uticaj ovog zlonamjernog softvera na ukupni kiberneti\u010dki prostor. Potrebno je jo\u0161 konfigurisati ure\u0111aje da su u skladu sa mogu\u0107nostima \u0161to manje izlo\u017eeni na Internetu i kao dodatnu mjeru sigurnosti pravilno konfigurisati <em>firewall<\/em>.<\/span> <\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Sigurnosni istra\u017eiva\u010di iz kompanije AT&amp;T Labs su otkrili novi zlonamjerni softver nazvan BotenaGo koji ima mogu\u0107nost da iskoristi ranjivosti u mre\u017enim ruterima i IoT ure\u0111ajima kori\u0161tenjem preko 30 razli\u010ditih metoda. Za sada nepoznati napada\u010di&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3675,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[162,163,161,126],"class_list":["post-3556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-firewall","tag-iot","tag-router","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3556"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3556\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3675"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}